Hacker Who Stole 620 Million Records Strikes Again, Stealing 127 Million More (techcrunch.com) 35
An anonymous reader quotes a report from TechCrunch: A hacker who stole close to 620 million user records from 16 websites has stolen another 127 million records from eight more websites, TechCrunch has learned. The hacker, whose listing was the previously disclosed data for about $20,000 in bitcoin on a dark web marketplace, stole the data last year from several major sites -- some that had already been disclosed, like more than 151 million records from MyFitnessPal and 25 million records from Animoto. But several other hacked sites on the marketplace listing didn't know or hadn't disclosed yet -- such as 500px and Coffee Meets Bagel. The Register, which first reported the story, said the data included names, email addresses and scrambled passwords, and in some cases other login and account data -- though no financial data was included. Now the same hacker has eight additional marketplace entries after their original listings were pulled offline, including:
- 18 million records from travel booking site Ixigo
- Live-video streaming site YouNow had 40 million records stolen
- Houzz, which recently disclosed a data breach, is listed with 57 million records stolen
- Ge.tt had 1.8 million accounts stolen
- 450,000 records from cryptocurrency site Coinmama.
- Roll20, a gaming site, had 4 million records listed
- Stronghold Kingdoms, a multiplayer online game, had 5 million records listed
- 1 million records from pet care delivery service PetFlow
- 18 million records from travel booking site Ixigo
- Live-video streaming site YouNow had 40 million records stolen
- Houzz, which recently disclosed a data breach, is listed with 57 million records stolen
- Ge.tt had 1.8 million accounts stolen
- 450,000 records from cryptocurrency site Coinmama.
- Roll20, a gaming site, had 4 million records listed
- Stronghold Kingdoms, a multiplayer online game, had 5 million records listed
- 1 million records from pet care delivery service PetFlow
Pet flow? (Score:2)
- 1 million records from pet care delivery service PetFlow
Well, I know what flows from pets and if somebody wants to hack to get that kind of stuff... Power to them.
Why Don't These Hackers Make Money Legitimately? (Score:3)
Re: Why Don't These Hackers Make Money Legitimatel (Score:1)
I believe it's because the skills required to hack a lot of websites are actually quite low end and it's mostly just a matter of nobody's trying and nobody's auditing their own network security.
In theory he best part of hacking is that you Force the world to take data security seriously. In practice these guys release a lot of data that mostly just sits there and has no use to anybody except perhaps the company that piled it up in the first place.
With the Advent of multi-factor authentication a lot of that
Re: (Score:3)
Gee, I don't know. Maybe it's the constant stream of hacking attempts literally everyone running anything attached to the Internet sees daily from Russia and China.
Re: (Score:2)
You're confusing "the hackers" with "the scripts ran by the script kiddies". They are different animals altogether.
Re:Why Don't These Hackers Make Money Legitimately (Score:5, Funny)
Here we go again... (Score:3)
I can only conclude that you listen to a lot of western propaganda; wherein everything you just can't wrap your head around means >Russia
The USA's own NSA has a long history of planting code [atlasobscura.com], and at time hacking enemies and allies.
Re: (Score:2)
Perhaps the hacker doen't live in an ecosystem where opportunities abound. Also, the hacking skill set may not be broad enough to extend to all of the talents required to hold an affluent job.
In any case, the hacker has established a business model that seems to be working.
Re: (Score:1)
My guess is they're involved in this kind of criminal behavior because of the same personality characteristics that would make it impossible to:
1) provide any kind of "customer support" in a self-employment situation, or
2) get a degree and/or be part of a typical workplace
Sneakers, Act 1: On going legit (Score:2)
Bank Secretary : So, people hire you to break into their places... to make sure no one can break into their places?
Martin Bishop : It's a living.
Bank Secretary : Not a very good one.
Same old same old (Score:2)
It...don't...fucking....matter!
It's all being given away for free, and the only way to keep it from being given away for free is to not use the internet.
That is all.
Re: (Score:2)
Ah come on.. Even the most secure password is all but pointless... UNLESS... You:
1. Change it often.
2. Don't reuse it at other sites or later at the same site.
3. Is Complex and long.
4. is not easy to guess.
Which is why I NEVER reuse my passwords and alter my usernames between sites. That way, when the information gets hacked, I don't have to worry about somebody saying "Hey, users are lazy and here is a user ID on this site with a password I know, over here on that other site... Let's see if he reused
Re: (Score:2)
Ah come on.. Even the most secure password is all but pointless... UNLESS... .
My point was that you can have as secure a password as you can have, but since the companies that people entrust their data to are simply not following any (or lax) security.
"According to the hacker’s listings, Ixigo and PetFlow used the old and outdated MD5 hashing algorithm to scramble passwords, which these days is easy to unscramble. YouNow is said to have not scrambled user passwords at all." And the security researcher says the hacker may have used the same tactics on the other sites.
Doesn't
Re: (Score:1)
The passwords were scrambled, so as long as a password is at least 12 characters of random upper and lowercase letters, numbers, and punctuation, and hasn't been used on any other sites, it's practically immune to brute-force attacks.
Re: (Score:2)
The passwords were scrambled, so as long as a password is at least 12 characters of random upper and lowercase letters, numbers, and punctuation, and hasn't been used on any other sites, it's practically immune to brute-force attacks.
It wasn't brute force, and the passwords were quite accessible.
Some places the passwords were stored using MD5, some were stored in cleartext. FTFA:
According to the hacker’s listings, Ixigo and PetFlow used the old and outdated MD5 hashing algorithm to scramble passwords, which these days is easy to unscramble. YouNow is said to have not scrambled user passwords at all.
And the security agency says it is likely the others were similarly easy to crack. Point is, these identity thefts were not ma
Re: (Score:2)
$20,000 isn't free.
But you're not wrong: what's the point in us trying to be secure if the damned sites we're trying to be secure on can't get their sh!t in order? How about some repercussions for lax security on the other side? Public non-apologies aren't good enough; somebody in authority at each company needs to be held accountable. "The captain is responsible for his ship and crew" and all that.
As long as the people in charge of the companies have absolutely no liability, these companies will have absolutely no security. Asome of these companies stored passwords in cleartext - some used md5 - not much better.
This needs to be criminalized, or else it will continue unabated, because no punishment, no fix. Bring a CEO into court, jail hime for a few years, and its a dead lock that the problem will be fixed in a matter of days.
Re: (Score:2)
Might have been a "she," in some godforsaken place other than New Jersey.
Finally (Score:2)
a series of hacks which will not provide me with another year of "credit monitoring" I think I have enough banked so 2 generations after me will have it available. /s
Password management is only as good as a sites ability to protect your information.
Increasingly bad design choices seem to be made by developers regarding the protection of your personal information.
Security is a mentality not skill (Score:3)
Seriously, think first and then remember simple and minimal is your friend in security
Re: (Score:2)
How can the average "web developer" do that, when they install 650+ "frameworks" just to be able to get some output to the browser console? Do you expect them to know what everything that they bundle with their "webapp" by blindly typing "npm run build" does? Security is hopeless.
Just wow (Score:2)
All more salt? (Score:2)
Stolen records (Score:2)
LPs or 45s?
That hacker could have saved some storage space by stealing cassette tapes instead.
Darn dirty hackers... (Score:2)
I swear, if any of my shadowrun players show up with 200 karma that fell off a back of a truck...